Total vulnerabilities in the database
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
Software | From | Fixed in |
---|---|---|
linuxfoundation / runc | 1.0.0-rc7 | 1.0.0-rc7.x |
linuxfoundation / runc | 1.0.0-rc6 | 1.0.0-rc6.x |
linuxfoundation / runc | 1.0.0-rc5 | 1.0.0-rc5.x |
linuxfoundation / runc | 1.0.0-rc4 | 1.0.0-rc4.x |
linuxfoundation / runc | 1.0.0-rc3 | 1.0.0-rc3.x |
linuxfoundation / runc | 1.0.0-rc2 | 1.0.0-rc2.x |
linuxfoundation / runc | 1.0.0-rc1 | 1.0.0-rc1.x |
linuxfoundation / runc | 1.0.0-rc8 | 1.0.0-rc8.x |
linuxfoundation / runc | 1.0.0-rc9 | 1.0.0-rc9.x |
linuxfoundation / runc | - | 0.1.1.x |
debian / debian_linux | 9.0 | 9.0.x |
debian / debian_linux | 10.0 | 10.0.x |
opensuse / leap | 15.1 | 15.1.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 19.10 | 19.10.x |
redhat / openshift_container_platform | 4.1 | 4.1.x |
redhat / openshift_container_platform | 4.2 | 4.2.x |
![]() |
- | 1.0.0-rc9.0.20200122160610-2fc03cc11c77 |